CVE-2020-12456

8.8 HIGH
Published: August 26, 2020 Modified: November 03, 2025

Description

A remote code execution vulnerability in Mitel MiVoice Connect Client before 214.100.1223.0 could allow an attacker to execute arbitrary code in the chat notification window, due to improper rendering of chat messages. A successful exploit could allow an attacker to steal session cookies, perform directory traversal, and execute arbitrary scripts in the context of the Connect client.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://www.mitel.com/support/security-advisories
Source: cve@mitre.org
Vendor Advisory
https://www.mitel.com/support/security-advisories
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0006
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
1.3%
80th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mitel